rammdemocorp-mend / WebGoat

Other
0 stars 0 forks source link

hello-world-1.0.0.tgz: 1 vulnerabilities (highest severity is: 7.5) unreachable #5

Open mend-for-github-com[bot] opened 6 months ago

mend-for-github-com[bot] commented 6 months ago
Vulnerable Library - hello-world-1.0.0.tgz

Library home page: https://registry.npmjs.org/@mend-eicar/hello-world/-/hello-world-1.0.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/@mend-eicar/hello-world/package.json

Found in HEAD commit: 34c275a0d27d38d86aac8bf97dc2a33067572073

Vulnerabilities

CVE Severity CVSS Exploit Maturity EPSS Dependency Type Fixed in (hello-world version) Remediation Possible** Reachability
MSC-2023-12475 High 7.5 High hello-world-1.0.0.tgz Direct N/A

Unreachable

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

MSC-2023-12475 ### Vulnerable Library - hello-world-1.0.0.tgz

Library home page: https://registry.npmjs.org/@mend-eicar/hello-world/-/hello-world-1.0.0.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/@mend-eicar/hello-world/package.json

Dependency Hierarchy: - :x: **hello-world-1.0.0.tgz** (Vulnerable Library)

Found in HEAD commit: 34c275a0d27d38d86aac8bf97dc2a33067572073

Found in base branch: main

### Reachability Analysis

The vulnerable code is unreachable

### Vulnerability Details

This package has been identified by Mend as containing potential malicious functionality. The severity of the functionality can change depending on where the library is running (user's machine or backend server). The following risks were identified: Malicious obfuscated code – the code is intentionally difficult to understand or reverse-engineer. Attackers often use this to conceal their intentions. Suspect publisher – this publisher has a history of delivering packages previously flagged as malicious.

Publish Date: 2023-02-28

URL: MSC-2023-12475

### Threat Assessment

Exploit Maturity: High

EPSS:

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.